Описание
A flaw was found in Pagure's rendering engine for reStructuredText (RST) files. An authenticated user can exploit an unrestricted .. include:: directive within RST files to read arbitrary internal files from the server hosting Pagure. This information disclosure vulnerability allows unauthorized access to sensitive data on the server.
Отчет
This vulnerability in Pagure's reStructuredText (RST) rendering engine allows an authenticated user to read arbitrary internal files from the server. This is due to the .. include:: directive in the docutils library not being restricted or jailed during the rendering process within Pagure. Exploitation requires an authenticated user to craft a malicious RST file.
Меры по смягчению последствий
To mitigate this vulnerability, restrict authenticated access to the Pagure instance to only trusted and authorized users. This operational control limits the attack surface by ensuring that only privileged individuals can interact with the vulnerable reStructuredText rendering engine. Implement strong authentication and authorization policies for Pagure users to minimize unauthorized access.
Дополнительная информация
Статус:
7.7 High
CVSS3
Связанные уязвимости
7.7 High
CVSS3